René's URL Explorer Experiment


Title: CVE-2011-4969 (Medium) detected in jquery.1.4.4.nupkg · Issue #12 · ignatandrei/JavaScriptAndMVVMandMVC · GitHub

Open Graph Title: CVE-2011-4969 (Medium) detected in jquery.1.4.4.nupkg · Issue #12 · ignatandrei/JavaScriptAndMVVMandMVC

X Title: CVE-2011-4969 (Medium) detected in jquery.1.4.4.nupkg · Issue #12 · ignatandrei/JavaScriptAndMVVMandMVC

Description: CVE-2011-4969 - Medium Severity Vulnerability Vulnerable Library - jquery.1.4.4.nupkg jQuery is a fast and concise JavaScript Library that simplifies HTML document traversing, event hand... Library home page: https://api.nuget.org/packag...

Open Graph Description: CVE-2011-4969 - Medium Severity Vulnerability Vulnerable Library - jquery.1.4.4.nupkg jQuery is a fast and concise JavaScript Library that simplifies HTML document traversing, event hand... Library...

X Description: CVE-2011-4969 - Medium Severity Vulnerability Vulnerable Library - jquery.1.4.4.nupkg jQuery is a fast and concise JavaScript Library that simplifies HTML document traversing, event hand... Library...

Opengraph URL: https://github.com/ignatandrei/JavaScriptAndMVVMandMVC/issues/12

X: @github

direct link

Domain: patch-diff.githubusercontent.com


Hey, it has json ld scripts:
{"@context":"https://schema.org","@type":"DiscussionForumPosting","headline":"CVE-2011-4969 (Medium) detected in jquery.1.4.4.nupkg","articleBody":"## CVE-2011-4969 - Medium Severity Vulnerability\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20\u003e Vulnerable Library - \u003cb\u003ejquery.1.4.4.nupkg\u003c/b\u003e\u003c/p\u003e\u003c/summary\u003e\n\n\u003cp\u003ejQuery is a fast and concise JavaScript Library that simplifies HTML document traversing, event hand...\u003c/p\u003e\n\u003cp\u003eLibrary home page: \u003ca href=\"https://api.nuget.org/packages/jquery.1.4.4.nupkg\"\u003ehttps://api.nuget.org/packages/jquery.1.4.4.nupkg\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003ePath to dependency file: /tmp/ws-scm/JavaScriptAndMVVMandMVC/packages/jQuery.Validation.1.11.1/jQuery.Validation.1.11.1.nuspec\u003c/p\u003e\n\u003cp\u003ePath to vulnerable library: /JavaScriptAndMVVMandMVC/packages/jQuery.Validation.1.11.1/jQuery.Validation.1.11.1.nuspec\u003c/p\u003e\n\u003cp\u003e\n\nDependency Hierarchy:\n  - :x: **jquery.1.4.4.nupkg** (Vulnerable Library)\n\u003cp\u003eFound in HEAD commit: \u003ca href=\"https://github.com/ignatandrei/JavaScriptAndMVVMandMVC/commit/f9885f517c6cbae93e178995ccc1763fbd601b93\"\u003ef9885f517c6cbae93e178995ccc1763fbd601b93\u003c/a\u003e\u003c/p\u003e\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20\u003e Vulnerability Details\u003c/summary\u003e\n\u003cp\u003e  \n  \nCross-site scripting (XSS) vulnerability in jQuery before 1.6.3, when using location.hash to select elements, allows remote attackers to inject arbitrary web script or HTML via a crafted tag.\n\n\u003cp\u003ePublish Date: 2013-03-08\n\u003cp\u003eURL: \u003ca href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4969\u003eCVE-2011-4969\u003c/a\u003e\u003c/p\u003e\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20\u003e CVSS 2 Score Details (\u003cb\u003e4.3\u003c/b\u003e)\u003c/summary\u003e\n\u003cp\u003e\n\nBase Score Metrics not available\u003c/p\u003e\n\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20\u003e Suggested Fix\u003c/summary\u003e\n\u003cp\u003e\n\n\u003cp\u003eType: Upgrade version\u003c/p\u003e\n\u003cp\u003eOrigin: \u003ca href=\"https://nvd.nist.gov/vuln/detail/CVE-2011-4969\"\u003ehttps://nvd.nist.gov/vuln/detail/CVE-2011-4969\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eRelease Date: 2013-03-08\u003c/p\u003e\n\u003cp\u003eFix Resolution: 1.6.3\u003c/p\u003e\n\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\n***\nStep up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)","author":{"url":"https://github.com/mend-bolt-for-github[bot]","@type":"Person","name":"mend-bolt-for-github[bot]"},"datePublished":"2019-11-01T18:48:24.000Z","interactionStatistic":{"@type":"InteractionCounter","interactionType":"https://schema.org/CommentAction","userInteractionCount":0},"url":"https://github.com/12/JavaScriptAndMVVMandMVC/issues/12"}

route-pattern/_view_fragments/issues/show/:user_id/:repository/:id/issue_layout(.:format)
route-controllervoltron_issues_fragments
route-actionissue_layout
fetch-noncev2:bde96edb-d931-c3c4-69b4-13231e7cb5e2
current-catalog-service-hash81bb79d38c15960b92d99bca9288a9108c7a47b18f2423d0f6438c5b7bcd2114
request-idEDF0:11BDB2:1A39BC7:214C59F:6991B4E3
html-safe-noncee86ea8efbd3889a4d1b2717c9dbb24360c9b044cdf26f7086a26c49655b16d77
visitor-payloadeyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJFREYwOjExQkRCMjoxQTM5QkM3OjIxNEM1OUY6Njk5MUI0RTMiLCJ2aXNpdG9yX2lkIjoiNjk0NDk2NTE4MTcxNDgzODc1NSIsInJlZ2lvbl9lZGdlIjoiaWFkIiwicmVnaW9uX3JlbmRlciI6ImlhZCJ9
visitor-hmacb3309a26f541efe3284b84b84ee4c3af9a6e7114261898ba188d41c574bfb0ca
hovercard-subject-tagissue:516287315
github-keyboard-shortcutsrepository,issues,copilot
google-site-verificationApib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I
octolytics-urlhttps://collector.github.com/github/collect
analytics-location///voltron/issues_fragments/issue_layout
fb:app_id1401488693436528
apple-itunes-appapp-id=1477376905, app-argument=https://github.com/_view_fragments/issues/show/ignatandrei/JavaScriptAndMVVMandMVC/12/issue_layout
twitter:imagehttps://opengraph.githubassets.com/0864565e3061d2a0cd1ad2199f210bc3c6c83de0f1efe4330840eaa4a05a677b/ignatandrei/JavaScriptAndMVVMandMVC/issues/12
twitter:cardsummary_large_image
og:imagehttps://opengraph.githubassets.com/0864565e3061d2a0cd1ad2199f210bc3c6c83de0f1efe4330840eaa4a05a677b/ignatandrei/JavaScriptAndMVVMandMVC/issues/12
og:image:altCVE-2011-4969 - Medium Severity Vulnerability Vulnerable Library - jquery.1.4.4.nupkg jQuery is a fast and concise JavaScript Library that simplifies HTML document traversing, event hand... Library...
og:image:width1200
og:image:height600
og:site_nameGitHub
og:typeobject
og:author:usernamemend-bolt-for-github[bot]
hostnamegithub.com
expected-hostnamegithub.com
None42c603b9d642c4a9065a51770f75e5e27132fef0e858607f5c9cb7e422831a7b
turbo-cache-controlno-preview
go-importgithub.com/ignatandrei/JavaScriptAndMVVMandMVC git https://github.com/ignatandrei/JavaScriptAndMVVMandMVC.git
octolytics-dimension-user_id153982
octolytics-dimension-user_loginignatandrei
octolytics-dimension-repository_id15478526
octolytics-dimension-repository_nwoignatandrei/JavaScriptAndMVVMandMVC
octolytics-dimension-repository_publictrue
octolytics-dimension-repository_is_forkfalse
octolytics-dimension-repository_network_root_id15478526
octolytics-dimension-repository_network_root_nwoignatandrei/JavaScriptAndMVVMandMVC
turbo-body-classeslogged-out env-production page-responsive
disable-turbofalse
browser-stats-urlhttps://api.github.com/_private/browser/stats
browser-errors-urlhttps://api.github.com/_private/browser/errors
release848bc6032dcc93a9a7301dcc3f379a72ba13b96e
ui-targetfull
theme-color#1e2327
color-schemelight dark

Links:

Skip to contenthttps://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/issues/12#start-of-content
https://patch-diff.githubusercontent.com/
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2Fignatandrei%2FJavaScriptAndMVVMandMVC%2Fissues%2F12
GitHub CopilotWrite better code with AIhttps://github.com/features/copilot
GitHub SparkBuild and deploy intelligent appshttps://github.com/features/spark
GitHub ModelsManage and compare promptshttps://github.com/features/models
MCP RegistryNewIntegrate external toolshttps://github.com/mcp
ActionsAutomate any workflowhttps://github.com/features/actions
CodespacesInstant dev environmentshttps://github.com/features/codespaces
IssuesPlan and track workhttps://github.com/features/issues
Code ReviewManage code changeshttps://github.com/features/code-review
GitHub Advanced SecurityFind and fix vulnerabilitieshttps://github.com/security/advanced-security
Code securitySecure your code as you buildhttps://github.com/security/advanced-security/code-security
Secret protectionStop leaks before they starthttps://github.com/security/advanced-security/secret-protection
Why GitHubhttps://github.com/why-github
Documentationhttps://docs.github.com
Bloghttps://github.blog
Changeloghttps://github.blog/changelog
Marketplacehttps://github.com/marketplace
View all featureshttps://github.com/features
Enterpriseshttps://github.com/enterprise
Small and medium teamshttps://github.com/team
Startupshttps://github.com/enterprise/startups
Nonprofitshttps://github.com/solutions/industry/nonprofits
App Modernizationhttps://github.com/solutions/use-case/app-modernization
DevSecOpshttps://github.com/solutions/use-case/devsecops
DevOpshttps://github.com/solutions/use-case/devops
CI/CDhttps://github.com/solutions/use-case/ci-cd
View all use caseshttps://github.com/solutions/use-case
Healthcarehttps://github.com/solutions/industry/healthcare
Financial serviceshttps://github.com/solutions/industry/financial-services
Manufacturinghttps://github.com/solutions/industry/manufacturing
Governmenthttps://github.com/solutions/industry/government
View all industrieshttps://github.com/solutions/industry
View all solutionshttps://github.com/solutions
AIhttps://github.com/resources/articles?topic=ai
Software Developmenthttps://github.com/resources/articles?topic=software-development
DevOpshttps://github.com/resources/articles?topic=devops
Securityhttps://github.com/resources/articles?topic=security
View all topicshttps://github.com/resources/articles
Customer storieshttps://github.com/customer-stories
Events & webinarshttps://github.com/resources/events
Ebooks & reportshttps://github.com/resources/whitepapers
Business insightshttps://github.com/solutions/executive-insights
GitHub Skillshttps://skills.github.com
Documentationhttps://docs.github.com
Customer supporthttps://support.github.com
Community forumhttps://github.com/orgs/community/discussions
Trust centerhttps://github.com/trust-center
Partnershttps://github.com/partners
GitHub SponsorsFund open source developershttps://github.com/sponsors
Security Labhttps://securitylab.github.com
Maintainer Communityhttps://maintainers.github.com
Acceleratorhttps://github.com/accelerator
Archive Programhttps://archiveprogram.github.com
Topicshttps://github.com/topics
Trendinghttps://github.com/trending
Collectionshttps://github.com/collections
Enterprise platformAI-powered developer platformhttps://github.com/enterprise
GitHub Advanced SecurityEnterprise-grade security featureshttps://github.com/security/advanced-security
Copilot for BusinessEnterprise-grade AI featureshttps://github.com/features/copilot/copilot-business
Premium SupportEnterprise-grade 24/7 supporthttps://github.com/premium-support
Pricinghttps://github.com/pricing
Search syntax tipshttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
documentationhttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2Fignatandrei%2FJavaScriptAndMVVMandMVC%2Fissues%2F12
Sign up https://patch-diff.githubusercontent.com/signup?ref_cta=Sign+up&ref_loc=header+logged+out&ref_page=%2F%3Cuser-name%3E%2F%3Crepo-name%3E%2Fvoltron%2Fissues_fragments%2Fissue_layout&source=header-repo&source_repo=ignatandrei%2FJavaScriptAndMVVMandMVC
Reloadhttps://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/issues/12
Reloadhttps://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/issues/12
Reloadhttps://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/issues/12
ignatandrei https://patch-diff.githubusercontent.com/ignatandrei
JavaScriptAndMVVMandMVChttps://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC
Notifications https://patch-diff.githubusercontent.com/login?return_to=%2Fignatandrei%2FJavaScriptAndMVVMandMVC
Fork 2 https://patch-diff.githubusercontent.com/login?return_to=%2Fignatandrei%2FJavaScriptAndMVVMandMVC
Star 0 https://patch-diff.githubusercontent.com/login?return_to=%2Fignatandrei%2FJavaScriptAndMVVMandMVC
Code https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC
Issues 21 https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/issues
Pull requests 6 https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/pulls
Actions https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/actions
Projects 0 https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/projects
Wiki https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/wiki
Security 0 https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/security
Insights https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/pulse
Code https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC
Issues https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/issues
Pull requests https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/pulls
Actions https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/actions
Projects https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/projects
Wiki https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/wiki
Security https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/security
Insights https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/pulse
New issuehttps://patch-diff.githubusercontent.com/login?return_to=https://github.com/ignatandrei/JavaScriptAndMVVMandMVC/issues/12
New issuehttps://patch-diff.githubusercontent.com/login?return_to=https://github.com/ignatandrei/JavaScriptAndMVVMandMVC/issues/12
CVE-2011-4969 (Medium) detected in jquery.1.4.4.nupkghttps://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/issues/12#top
security vulnerabilitySecurity vulnerability detected by WhiteSourcehttps://github.com/ignatandrei/JavaScriptAndMVVMandMVC/issues?q=state%3Aopen%20label%3A%22security%20vulnerability%22
https://github.com/apps/mend-bolt-for-github
https://github.com/apps/mend-bolt-for-github
mend-bolt-for-githubhttps://github.com/apps/mend-bolt-for-github
on Nov 1, 2019https://github.com/ignatandrei/JavaScriptAndMVVMandMVC/issues/12#issue-516287315
CVE-2011-4969https://github.com/advisories/GHSA-579v-mp3v-rrw5
https://camo.githubusercontent.com/7f707ecbb163ab74b555da5daea2f4e73596a00ea0f498a511bb2245fe6dcafc/68747470733a2f2f7768697465736f757263652d7265736f75726365732e7768697465736f75726365736f6674776172652e636f6d2f76756c6e65726162696c6974795f64657461696c732e706e67
https://api.nuget.org/packages/jquery.1.4.4.nupkghttps://api.nuget.org/packages/jquery.1.4.4.nupkg
f9885f517c6cbae93e178995ccc1763fbd601b93https://github.com/ignatandrei/JavaScriptAndMVVMandMVC/commit/f9885f517c6cbae93e178995ccc1763fbd601b93
https://camo.githubusercontent.com/1dbe807ae3be1590d27523cd4e02c03a8d07e1dff49ec0084294a2c006984b4c/68747470733a2f2f7768697465736f757263652d7265736f75726365732e7768697465736f75726365736f6674776172652e636f6d2f6d656469756d5f76756c2e706e67
CVE-2011-4969https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4969
https://camo.githubusercontent.com/8b05d7d0c83d5dc1f3422d1e4497c6a700365c61fc1dd1e3769cd369cdeb63a5/68747470733a2f2f7768697465736f757263652d7265736f75726365732e7768697465736f75726365736f6674776172652e636f6d2f63767373332e706e67
https://camo.githubusercontent.com/a06e014122a02d3958748cbca226e8fc721aaef2a61d9ec4be1c79248702fdd7/68747470733a2f2f7768697465736f757263652d7265736f75726365732e7768697465736f75726365736f6674776172652e636f6d2f7375676765737465645f6669782e706e67
https://nvd.nist.gov/vuln/detail/CVE-2011-4969https://nvd.nist.gov/vuln/detail/CVE-2011-4969
herehttps://www.whitesourcesoftware.com/full_solution_bolt_github
security vulnerabilitySecurity vulnerability detected by WhiteSourcehttps://github.com/ignatandrei/JavaScriptAndMVVMandMVC/issues?q=state%3Aopen%20label%3A%22security%20vulnerability%22
https://github.com
Termshttps://docs.github.com/site-policy/github-terms/github-terms-of-service
Privacyhttps://docs.github.com/site-policy/privacy-policies/github-privacy-statement
Securityhttps://github.com/security
Statushttps://www.githubstatus.com/
Communityhttps://github.community/
Docshttps://docs.github.com/
Contacthttps://support.github.com?tags=dotcom-footer

Viewport: width=device-width


URLs of crawlers that visited me.